Consider a simple graph on vertices and edges together with a total labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say defined by for all where Also, the value is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by and is the least for which G admits edge irregular h-labeling. In this article, for some common graph families are examined. In addition, an open problem is solved affirmatively.
استهدف البحث الحالي عزل بعض الجراثيم المرضية المشتركة وشملت Listeria monocytogenes و Salmonella spp. و Brucella abortus من أنسجة أعمار مختلفة من الأغنام العواسية المحلية . أخذت عينات من الكبد والكلى والدم ومن محتويات منتصف أمعاء ثلاث مجاميع عمرية من الأغنام العواسية من مجزرة الشعلة ببغداد شملت أعمار اقل من سنة واحدة وسنة إلى سنتين وأكثر من ثلاث سنوات . بينت النتائج عزل جراثيم Listeria monocytogenes و Salmonella spp. و Brucella abortus من كافة المجاميع
... Show MoreStill Financial institutions, including banks, a key target for money launderers to transfer illicit funds to the legitimate funds and by weaknesses in the internal audit procedures applied in the banks or through a lack of legal structure to combat this phenomenon in addition to the procedures by other regulations
T
... Show MoreA mathematical model is developed which predicates the performance of cylindrical ion exchange bed involving comparing of axial dispersion model for cation exchange column with different assumption, this model permits the performance to predicate the residence time within the bed with the variance, axial dispersion and Pecklet No. to indicated deviation from plug flow model.
Two type of systems are chosen for positive ions first with divalent ions (Ca+2) to exchange with resin of Na+1form used as application in water softener units and second with monovalent ions (Na+1) to exchange with resin of H+1 form used as application in deionize water units &n
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show Moreدراسة حاكمية الجامعات وأثرها في القرار الاستراتيجي
This study can be considered as un introduction to the idioms and the strategy about the productive partnership development connection, that helps the researcher and the organization in their work in to activate development and the natural sources,manegment,to improve the two sides active connected to the local society, and to use it as easier and smoother participation of the people who work in development field and the natural sources management research, That connection depends mostly upon the capability of researcher and the development worker to increase the ability of individual and local society to specify and analyzing their problems and to try solutions to make their life better with good income.
The using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible parametric models and these models were nonparametric, many researchers, are interested in the study of the function of permanence and its estimation methods, one of these non-parametric methods.
For work of purpose statistical inference parameters around the statistical distribution for life times which censored data , on the experimental section of this thesis has been the comparison of non-parametric methods of permanence function, the existence
... Show MoreEnglish ابحث عن مقالات و مجلات ... تحليل علاقة ثقافة المنظمة بلازمة من منظور الفردبة - الجماعية أ.د زكـريا مطلك الدوري، أ.د سـعـد علي العـنزي، أ. يعرب عدنان السعيدي مجلة كلية بغداد للعلوم الاقتصادية الجامعة 2009, المجلد 2, العدد 20, الصفحات 107-122 الخلاصة تتعدد وجهات النظر بشأن الاسباب والمعالجات الممكنة للازمات، وان هذا الاختلاف يرجع بالاصل إلى تنوع المداخل التي يعتمد عليها الباحثين في تناول الظاهرة أو الموضوع. وضمن هذا
... Show MoreIn this paper, the Azzallini’s method used to find a weighted distribution derived from the standard Pareto distribution of type I (SPDTI) by inserting the shape parameter (θ) resulting from the above method to cover the period (0, 1] which was neglected by the standard distribution. Thus, the proposed distribution is a modification to the Pareto distribution of the first type, where the probability of the random variable lies within the period The properties of the modified weighted Pareto distribution of the type I (MWPDTI) as the probability density function ,cumulative distribution function, Reliability function , Moment and the hazard function are found. The behaviour of probability density function for MWPDTI distrib
... Show Moreهدف الدراسة معرفة التأثير السمي التراكمي للأعلاف الملوثة بالحنطة المتفحمة على أفراخ فروج اللحم .اجري هذا البحث في مختبرات الصحة الحيوانية التابعة لوزارة العلوم والتكنولوجيا استعمل 78 فرخاً لهذه التجربة قسمت إلى ستة مجاميع ربيت في أقفاص خاصة أعدت لهذا الغرض. تم تغذيتها يوميا على أعلاف ملوثة حسب برامج التغذية المتبعة , تمثلت المجموعة الأولى بمجموعة السيطرة والتي غذيت على عليقه تحوي الحنطة